LEADER 03361nam 22006615 450 001 9910726295403321 005 20251008133517.0 010 $a3-031-26896-2 024 7 $a10.1007/978-3-031-26896-0 035 $a(CKB)26748706700041 035 $a(MiAaPQ)EBC7248771 035 $a(Au-PeEL)EBL7248771 035 $a(DE-He213)978-3-031-26896-0 035 $a(BIP)087732368 035 $a(PPN)270618902 035 $a(MiAaPQ)EBC7248548 035 $a(EXLCZ)9926748706700041 100 $a20230511d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCAD for Hardware Security /$fby Farimah Farahmandi, M. Sazadur Rahman, Sree Ranjani Rajendran, Mark Tehranipoor 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (415 pages) 311 08$a9783031268953 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- CAD for Information Leakage Assessment -- CAD for Power Side Channel Leakage Assessment -- CAD for Electromagnetic Radiation Leakage Assessment -- CAD for Timing Leakage Assessment -- CAD for Fault Injection Attack Analysis -- CAD for Obfuscation -- CAD for Watermarking -- CAD for HW Metering -- CAD for Detecting HLS Vulnerabilities -- CAD for Counterfeit Detection and Prevention -- CAD for Trojan Detection and Prevention -- CAD for Physical Assurance -- CAD for Anti-Probing -- CAD for Formal Security Verification -- CAD for Reverse Engineering. 330 $aThis book provides an overview of current hardware security problems and highlights how these issues can be efficiently addressed using computer-aided design (CAD) tools. Authors are from CAD developers, IP developers, SOC designers as well as SoC verification experts. Readers will gain a comprehensive understanding of SoC security vulnerabilities and how to overcome them, through an efficient combination of proactive countermeasures and a wide variety of CAD solutions. Offers techniques to protect hardware designs from a variety of vulnerabilities using CAD; Provides a comprehensive introduction to current SoC security vulnerabilities at different levels of abstraction; Discusses CAD-based approaches and their application to SoC security issues at various levels of design abstraction. 606 $aElectronic circuits 606 $aInternet of things 606 $aMicroprocessors 606 $aComputer architecture 606 $aElectronic Circuits and Systems 606 $aInternet of Things 606 $aProcessor Architectures 615 0$aElectronic circuits. 615 0$aInternet of things. 615 0$aMicroprocessors. 615 0$aComputer architecture. 615 14$aElectronic Circuits and Systems. 615 24$aInternet of Things. 615 24$aProcessor Architectures. 676 $a005.8 676 $a005.8 700 $aFarahmandi$b Farimah$0977878 702 $aRahman$b M. Sazadur 702 $aRajendran$b Sree Ranjani 702 $aTehranipoor$b Mohammad H.$f1974- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910726295403321 996 $aCAD for Hardware Security$93385185 997 $aUNINA